VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

Size: px
Start display at page:

Download "VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module"

Transcription

1 VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N : 1. 0

2 Table of Contents 1 Introduction Purpose References Document Organization VMware Horizon JCE Module VMware Overview Horizon VMware Horizon JCE Module Module Specification Physical Cryptographic Boundary Logical Cryptographic Boundary Module Interfaces Roles and Services Crypto Officer Role User Role Physical Security Operational Environment Cryptographic Key Management Approved Cryptographic Algorithms Non Approved Algorithms Critical Security Parameters Self-Tests Power-Up Self-Tests Conditional Self-Tests Critical Functions Tests Mitigation of Other Attacks Secure Operation Crypto Officer Guidance Initial Setup Secure Installation VMware Horizon JCE Module Secure Operation User Guidance Acronyms VMware Horizon JCE (Java Cryptographic Extension) Module Page 1 of 21

3 List of Figures Figure 1 Architectural Overview of the VMware JCE... 5 Figure 2 Relationship of VMware Horizon JCE and View Components... 5 Figure 3 Dell R630 Server Block Diagram... 7 Figure 4 - VMware Horizon JCE Module Logical Cryptographic Boundary... 8 List of Tables Table 1 - Security Level Per FIPS Section... 6 Table 2 - FIPS Logical Interface Mappings... 9 Table 3 - Crypto Officer Services... 9 Table 4 - User Services Table 5 - FIPS-Approved Algorithm Implementations Table 6 - VMware Horizon JCE Module Non-Approved Algorithms and Services Table 7 - List of Cryptographic Keys, Cryptographic Key Components, and CSPs Table 8 Acronyms VMware Horizon JCE (Java Cryptographic Extension) Module Page 2 of 21

4 1 Introduction 1.1 Purpose This is a non-proprietary Cryptographic Module Security Policy for the VMware Horizon JCE (Java Cryptographic Extension) Module from VMware, Inc. This Security Policy describes how the VMware Horizon JCE (Java Cryptographic Extension) Module meets the security requirements of Federal Information Processing Standards (FIPS) Publication 140-2, which details the U.S. and Canadian Government requirements for cryptographic modules. More information about the FIPS standard and validation program is available on the National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) Cryptographic Module Validation Program (CMVP) website at This document also describes how to run the module in a secure FIPS-Approved mode of operation. This Security Policy was prepared as part of the Level 1 FIPS validation of the module. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS cryptographic module security policy. More information is available on the module from the following sources: The VMware website ( contains information on the full line of products from VMware. The CMVP website ( contains contact information for individuals to answer technical or sales-related questions for the module. 1.3 Document Organization The Security Policy document is one document in a FIPS Submission Package. In addition to this document, the Submission Package contains: Vendor Evidence document Finite State Model document Other supporting documentation as additional references This Security Policy and the other validation submission documentation were produced by VMware. With the exception of this Non-Proprietary Security Policy, the FIPS Submission Package is proprietary to VMware and is releasable only under appropriate non-disclosure agreements. For access to these documents, please contact VMware. VMware Horizon JCE (Java Cryptographic Extension) Module Page 3 of 21

5 2 VMware Horizon JCE (Java Cryptographic Extension) Module 2.1 VMware Overview VMware, Inc. is a global leader in virtualization and cloud infrastructure, delivering customer-proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware s approach accelerates the transition to cloud and improving security and control Horizon 6 Horizon 6 leverages desktop virtualization with View and builds on these capabilities, allowing IT to deliver virtualized and remoted desktop and applications through a single platform and supports users with access to all their Windows and online resources through one unified workspace. Horizon 6 supports the following key functionalities. Desktops and Applications Delivered through a Single Platform Deliver virtual or remoted desktops and applications through a single platform to streamline management and easily entitle end users. Unified Workspace Securely delivers desktops, applications, and online services to end users through a unified workspace, providing a consistent user experience across devices, locations, media, and connections. Closed Loop Management and Automation Consolidated control, delivery and protection of user compute resources with cloud analytics and automation, cloud orchestration and self-service features. Optimization with the Software-Defined Data Center Allocates resources dynamically with virtual storage, compute, and networking to manage and deliver desktop services on demand. Central Image Management Central image management for physical, virtual, and BYO devices. Hybrid-cloud flexibility Provides an architecture built for onsite and cloud-based deployment VMware Horizon JCE (Java Cryptographic Extension) Module The VMware Horizon JCE (Java Cryptographic Extension) Module is a software cryptographic module containing a set of cryptographic functions available to the Horizon 6 View Connection Server, Security Server and View Agent via a well-defined Application Programming Interface (API). These functions facilitate the secure transfer of information between both View Components and external services where security is paramount. Within the context of this security policy, the VMware Horizon JCE (Java Cryptographic Extension) Module is also referred to as VMware Horizon JCE Module. The VMware Horizon JCE Module is a shared cryptographic library which provides the FIPS-Approved algorithms necessary for secure connections and services. The VMware Horizon JCE Module includes implementations of the following FIPS-Approved security functions: Symmetric key functions using AES 1 and Triple DES 2 Hashing functions using SHA 3 Asymmetric key functions using RSA 4 and DSA 5 Random number generation using NIST SP A Hash-based DRBG 7 1 AES Advanced Encryption Standard 2 DES Data Encryption Standard 3 SHA Secure Hash Algorithm 4 RSA Rivest, Shamir, Adleman 5 DSA Digital Signature Algorithm 6 SP Special Publication 7 DRBG Deterministic Random Bit Generator VMware Horizon JCE (Java Cryptographic Extension) Module Page 4 of 21

6 Figure 1 provides an architectural overview of the components that interact with the VMware Horizon JCE Module. The module is deployed into a Java Virtual Machine (JVM) where it implements a cryptographic service provider within the Java Cryptography Architecture (JCA). The services it provides are made available to applications through the JCA framework. The indirection through the framework enables applications to be independent of the providers that implement the cryptographic services with the selection of the provider being made at run time on the basis of a provided configuration. Application Layer Java Cryptography Architecture (JCA) Framework VMware Horizon JCE Module JVM Hardware Figure 1 Architectural Overview of the VMware JCE Figure 2 illustrates how the three Horizon 6 View components leverage the VMware Horizon JCE Module. The View Security Server, View Connection Server and View Agent, interact with the VMware Horizon JCE Module by making cryptographic requests through the JCA framework. When these components have been configured to use FIPS cryptographic functionality, the configuration options are set such that the JCA Framework will route such requests to the VMware Horizon JCE. View Security Server View Connection Server View Agent JCA Framework JCA Framework JCA Framework VMware Horizon JCE VMware Horizon JCE VMware Horizon JCE Hardware Hardware Hardware Figure 2 Relationship of VMware Horizon JCE and View Components VMware Horizon JCE (Java Cryptographic Extension) Module Page 5 of 21

7 The VMware Horizon JCE Module is validated at FIPS Section levels shown in Table 1. Table 1 - Security Level Per FIPS Section Section Section Title Level 1 Cryptographic Module Specification 1 2 Cryptographic Module Ports and Interfaces 1 3 Roles, Services, and Authentication 1 4 Finite State Model 1 5 Physical Security N/A 6 Operational Environment 1 7 Cryptographic Key Management 1 8 EMI/EMC Self-tests 1 10 Design Assurance 1 11 Mitigation of Other Attacks N/A 2.2 Module Specification The VMware Horizon JCE Module is a software cryptographic module with a multi-chip standalone embodiment. The overall security level of the module is 1. The module was tested and found to be FIPS compliant on the following platforms: Horizon 6, version 6.2 with Sun JRE 1.8 on Windows Server 2012R2 Datacenter hosted on VMware vsphere Hypervisor (ESXi) 6.0 running on Dell PowerEdge R630 with Intel(R) Xeon(R) E CPU Horizon 6, version 6.2 with Sun JRE 1.8 on Windows 7 SP1 Enterprise (32 bit) hosted on VMware vsphere Hypervisor (ESXi) 6.0 running on Dell PowerEdge R630 with Intel(R) Xeon(R) E CPU VMware, Inc. affirms that the VMware Horizon JCE Module runs in its configured, Approved mode of operation on the following binary compatible platforms executing VMware vsphere Hypervisor (ESXi) 6.0: A general purpose computing platform with an AMD Opteron x86 Processor executing Horizon 6 on Windows Server 2008 R2 SP1 Standard, Windows Server 2008 R2 SP1 Enterprise, Windows Server 2008 R2 SP1 Datacenter, Windows Server 2012 Standard, Windows Server 2012 Datacenter, Windows Server 2012 R2 Standard, Windows Server 2012 R2 Datacenter. A general purpose computing platform with an Intel Core i3, Core i5, Core i7, and Xeon x86 Processor executing Horizon 6 on Windows Server 2008 R2 SP1 Standard, Windows Server 2008 R2 SP1 Enterprise, Windows Server 2008 R2 SP1 Datacenter, Windows Server 2012 Standard, Windows 7 SP1 Professional and Windows 7 SP1 Enterprise. Because the VMware Horizon JCE Module is defined as a software cryptographic module, it possesses both a physical cryptographic boundary and a logical cryptographic boundary. Sections and describe the physical and logical boundaries of the module. 8 EMI/EMC Electromagnetic Interference/Electromagnetic Compatibility VMware Horizon JCE (Java Cryptographic Extension) Module Page 6 of 21

8 2.2.1 Physical Cryptographic Boundary As a software cryptographic module, the module must rely on the physical characteristics of the host system. The physical boundary of the cryptographic module is defined by the hard enclosure around the host system on which it runs. The module supports the physical interfaces of the Dell PowerEdge R630. These interfaces include the integrated circuits of the system board, processor, network adapters, RAM 9, hard disk, device case, supply, and fans. See Figure 3 for a block diagram of the Dell PowerEdge R630. Hardware Management RAM Network DVD Clock Generator North Bridge SCSI/SATA Controller HDD Serial CPU(s) South Bridge LED Cache PCI/PCIe Slots Audio USB Power Interface Graphics Controller BIOS PCI/PCIe Slots Key: BIOS Basic Input/Output System CPU Central Processing Unit SATA Serial Advanced Technology Attachment SCSI Small Computer System Interface PCI Peripheral Component Interconnect LED Light Emitting Diode PCIe PCI express HDD Hard Disk Driver DVD Digital Video Disk USB Universal Serial Bus RAM Random Access Memory Figure 3 Dell R630 Server Block Diagram 9 RAM Random Access Memory VMware Horizon JCE (Java Cryptographic Extension) Module Page 7 of 21

9 2.2.2 Logical Cryptographic Boundary Figure 3 shows a logical block diagram of the module and its surrounding software components, as well as the module s logical cryptographic boundary. The files and binaries that make up the cryptographic module are shown as the VMware Horizon JCE Module in Figure 4. The module is a cryptographic provider to the Java Runtime Environment (JRE). Java-based applications such as the Tomcat server call the module s services through the JRE. The module s logical boundary is a contiguous perimeter that surrounds all -mapped functionality provided by the module when loaded and stored in the host platform s. Horizon 6 Runtime Services Java Cryptographic Framework VMware Horizon JCE Module User space Kernel space Operating System VMware vsphere Hypervisor (ESXi) 6.0 Dell PowerEdge R630 System calls Control Input Data Input Data Output Status Output Logical Cryptographic boundary Figure 4 - VMware Horizon JCE Module Logical Cryptographic Boundary 2.3 Module Interfaces The module s logical interfaces exist at a low level in the software as an API. Both the API and physical interfaces can be categorized into the following interfaces defined by FIPS 140-2: Data input Data output Control input Status output Power input As a software module, the module has no physical characteristics. Thus, the module s manual controls, physical indicators, and physical and electrical characteristics are those of the host device. A mapping of the FIPS logical interfaces, the physical interfaces, and the module interfaces can be found in Table 2 below. VMware Horizon JCE (Java Cryptographic Extension) Module Page 8 of 21

10 Data Input Data Output Control Input Table 2 - FIPS Logical Interface Mappings FIPS Interface Physical Interface Module Interface (API) Network port, Serial port, SCSI/SATA Controller, USB port Network port, Serial port, SCSI/SATA Controller, USB port Network port, Serial port, USB port, Power button Status Output Network port, Serial port, USB port, Graphics controller Power Input AC Power socket Not applicable Method calls that accept, as their arguments, data to be used or processed by the module Arguments for a method that specify where the result of the method is stored Method calls utilized to initiate the module and the method calls used to control the operation of the module Thrown exceptions for method calls 2.4 Roles and Services There are two roles in the module (as required by FIPS 140-2) that operators may assume: a Crypto Officer (CO) role and a User role. As the module does not support an authentication mechanism, roles are assumed implicitly through the execution of either a CO or User service. Each role and their corresponding services are detailed in the sections below. Please note that the keys and Critical Security Parameters (CSPs) listed in Table 3 and Table 4 below indicate the types of access required using the following notation: R Read: The CSP is read. W Write: The CSP is established, generated, modified, or zeroized. X Execute: The CSP is used within an Approved or Allowed security function or authentication mechanism Crypto Officer Role To assume the CO role, an operator of the module will perform one of the services listed in Table 3. The CO has the ability to enter and exit FIPS mode, run self-tests on demand, show status, and zeroize all keying material. Table 3 - Crypto Officer Services Service Description CSP and Type of Access Initialize module Show status Run self-tests on demand Zeroize keys Performs integrity check and -up self-tests Returns the current mode of the module Performs -up selftests Zeroizes and de-allocates containing sensitive data None None None All keys W VMware Horizon JCE (Java Cryptographic Extension) Module Page 9 of 21

11 2.4.2 User Role To assume the User role, an operator of the module will perform one of the services listed in Table 4. The User has the ability to generate random numbers, symmetric and asymmetric keys, and digital signatures. Table 4 - User Services Service Description CSP and Type of Access Generate random number Generate message digest Generate keyed hash (HMAC) Generate Cipher Hash (CMAC 11 ) Generate symmetric key Symmetric encryption Symmetric decryption Generate asymmetric key pair Key Wrapping Key Unwrapping Signature Generation Signature Verification Returns the specified number of random bits to calling application Compute and return a message digest using SHS algorithms Compute and return a message authentication code Compute and return a cipher message authentication code Generate and return the specified type of symmetric key Encrypt plaintext using supplied key and algorithm specification Decrypt ciphertext using supplied key and algorithm specification Generate and return the specified type of asymmetric key pair Perform key wrap with RSA public key, AES key, and Triple-DES Key Perform key unwrap with RSA private key, AES key, and Triple-DES Key Generate a signature for the supplied message using the specified key and algorithm Verify the signature on the supplied message using the specified key and algorithm DRBG Seed WRX DRBG C Value WRX DRBG V Value WRX DRBG Entropy WRX None HMAC 10 key RX AES CMAC Key RX Triple-DES CMAC Key RX Triple-DES Key W AES key RX Triple-DES key RX AES key RX Triple-DES key RX RSA private/public key W DSA private/public key W RSA Public Key RX AES Key RX Triple-DES Key RX RSA Private Key RX AES Key RX Triple-DES Key RX RSA private key RX DSA private key RX RSA public key RX DSA public key RX 10 HMAC (keyed-) Hash-based Message Authentication Code 11 CMAC Cipher-based Message Authentication Code VMware Horizon JCE (Java Cryptographic Extension) Module Page 10 of 21

12 2.5 Physical Security The VMware Horizon JCE Module is a software module, which FIPS defines as a multi-chip standalone cryptographic module. As such, it does not include physical security mechanisms. Thus, the FIPS requirements for physical security are not applicable. 2.6 Operational Environment The module was tested and found to be compliant with FIPS requirements with Horizon 6, version 6.2 with Sun JRE 1.8 on Windows Server 2012R2 Datacenter hosted on VMware vsphere Hypervisor (ESXi) 6.0 running on Dell PowerEdge R630 with Intel(R) Xeon(R) E CPU and also with Horizon 6, version 6.2 with Sun JRE 1.8 on Windows 7 SP1 Enterprise (32 bit) hosted on VMware vsphere Hypervisor (ESXi) 6.0 running on Dell PowerEdge R630 with Intel(R) Xeon(R) E CPU. The cryptographic module will utilize the Java Virtual Machine (JVM) provided by Sun JRE v1.8. The JVM is responsible for relaying information from calling applications to the cryptographic module. All cryptographic keys and CSPs are under the control of the OS, which protects the module s CSPs against unauthorized disclosure, modification, and substitution. The module only allows access to CSPs through its well-defined API. 2.7 Cryptographic Key Management The following sections highlight the module s cryptographic keys and critical security parameters Approved Cryptographic Algorithms The module implements the FIPS-Approved algorithms listed in Table 5 below. Table 5 - FIPS-Approved Algorithm Implementations Algorithm Certificate Number AES in ECB 12, CBC 13, CFB , OFB 15, and CMAC modes 3554 encrypt/decrypt with 128-, 192- and 256-bit keys Triple-DES in ECB, CBC, CFB-8, CFB-64, and CMAC modes 1987 encrypt/decrypt; KO 16 1 RSA (FIPS 186-4) Key Generation with and 3072-bit key 1830 range RSA (PKCS 17 #1 v1.5) Signature Generation and Verification 1830 RSA (PSS 18 ) Signature Generation and Verification 1830 DSA (FIPS 186-4) Key Generation with and 3072-bit keys 992 DSA Signature Generation and Verification 992 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 hash 2929 HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, 2268 HMAC-SHA-512 keyed hash SP A Hash_DRBG ECB Electronic Codebook 13 CBC Cipher Block Chaining 14 CFB Cipher Feedback 15 OFB Output Feedback 16 KO Keying Option 17 PKCS Public-Key Cryptography Standards 18 PSS Probabilistic Signature Scheme VMware Horizon JCE (Java Cryptographic Extension) Module Page 11 of 21

13 The module employs the following key establishment methodologies, which are allowed for use in a FIPS- Approved mode of operation: RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength) AES (Cert. #3554, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength) Triple-DES (Cert. #1987, key wrapping; key establishment methodology provides 112 bits of encryption strength) Caveats: Additional information concerning SHA-1, Diffie-Hellman key agreement/key establishment, RSA 1024-bit signature generation, RSA key transport, DSA key generation, DSA signature generation, and specific guidance on transitions to the use of stronger cryptographic keys and more robust algorithms is contained in NIST Special Publication A. The module generates cryptographic keys whose strengths are modified by available entropy; No assurance of the minimum strength of generated keys. VMware Horizon JCE (Java Cryptographic Extension) Module Page 12 of 21

14 2.7.2 Non Approved Algorithms The module employs non-approved cryptographic algorithms and services, which are accessible by the operator of the module. The use of these algorithms and services leads the module to operate in the non- Approved mode of operation. Their use, while operating in the FIPS-Approved mode, is strictly prohibited. Table 6 lists the non-approved algorithms services provided by the module. Table 6 - VMware Horizon JCE Module Non-Approved Algorithms and Services Algorithm RC2 19 RC4 TWOFISH IES 20 /ECIES 21 DES Triple-DES (2-key) 22 MD2 23 /MD5 RIPE MD TIGER ISO Alg3 MAC RSA DSA SHA-1 Service Encryption; Decryption Encryption; Decryption Encryption; Decryption Encryption; Decryption Encryption; Decryption Encryption; Decryption Hashing Hashing Hashing Hash-based Message Authentication Code Key Generation; Signature Generation; Key Wrapping (Key size < 2048) Key Generation; Signature Generation (Key size < 2048) Signature Generation 19 RC Rivest Cipher 20 IES Integrated Encryption Scheme 21 ECIES Elliptic Curve IES 22 To use the two-key Triple-DES algorithm to encrypt data or wrap keys in an Approved mode of operation, the module operator shall ensure that the same two-key Triple-DES key is not used for encrypting data (or wrapping keys) with more than 2^20 plaintext data (or plaintext keys). Please refer to Appendix A of SP A for restriction information regarding its use until December 31, MD Message Digest 24 ISO International Organization for Standards VMware Horizon JCE (Java Cryptographic Extension) Module Page 13 of 21

15 2.7.3 Critical Security Parameters The module supports the CSPs listed below in Table 7. Table 7 - List of Cryptographic Keys, Cryptographic Key Components, and CSPs CSP CSP Type Generation 25 / Input Output Storage Zeroization Use AES key AES 128-, 192-, 256-bit key AES CMAC Key AES CMAC 128-, 192, 256-bit key Triple-DES key Triple-DES 168- bit secure key Triple-DES CMAC Key HMAC key Triple-DES CMAC 168-bit key 160- to 512-bit HMAC Key RSA private key RSA 2048-, 3072-bit key RSA public key RSA 2048-, 3072-bit key API call parameter API call parameter API call parameter or internally generated API call parameter API call parameter API call parameter or internally generated API call parameter or internally generated DSA private key DSA 224-bit key API call parameter or internally generated DSA public key DRBG Seed DRBG Entropy Hash DRBG V value Hash DRBG C value DSA 2048-bit key 880-bit random value 440-bit random value Internal hash DRBG state value Internal hash DRBG state value API call parameter or internally generated API call parameter or Internally generated API call parameter or Internally generated Internally generated Internally generated Output via GPC 26 INT path 27 Output via GPC INT path Output via GPC INT path Output via GPC INT path Output via GPC INT path Output via GPC INT path Output via GPC INT path Output via GPC INT path Output via GPC INT path Never Never Never Never Encryption, Decryption Message Authentication with AES Encryption, decryption Message Authentication with Triple-DES Message Authentication with SHA-1 and SHA-2 family Signature generation, key unwrapping Signature verification, key wrapping Signature generation Signature verification Seed input to SP Hash_DRBG Entropy input to SP Hash_DRBG Used for SP Hash_DRBG Used for SP Hash_DRBG 2.8 Self-Tests 25 The module complies with IG 7.8 Scenario 1 for symmetric key generation as well as the seed supplied to the algorithm for generating asymmetric keys 26 GPC General Purpose Computer 27 GPC INT Path defined in Implementation Guidance Section 7.7 VMware Horizon JCE (Java Cryptographic Extension) Module Page 14 of 21

16 Cryptographic self-tests are performed by the module after the module begins normal operation as well as when a random number or asymmetric key pair is created. The following sections list the self-tests performed by the module, their expected error status, and error resolutions Power-Up Self-Tests Power-up self-tests are automatically performed by the module when the module begins operation in the FIPS- Approved mode. The list of -up self-tests that follows may also be run on-demand when the CO restarts the JRE or reboots the OS. The module will perform the listed -up self-tests to successful completion. During the execution of self-tests, data output from the module is inhibited. If any of the self-tests fail, the module will return an error to the JRE and enter an error state. After entering the error state, all subsequent calls to the module requiring cryptographic operation or data output will be rejected, ensuring that these abilities of the module are inhibited. In order to resolve a cryptographic self-test error, the JRE must unload the module and then reload it. If the error persists, the module must be reinstalled. The VMware Horizon JCE Module performs the following Power-up Self-tests: Software integrity check (HMAC SHA-1) Known Answer Tests (KATs) o AES KAT (Encrypt) o AES KAT (Decrypt) o Triple-DES KAT (Encrypt) o Triple-DES KAT (Decrypt) o RSA KAT (Signature Generation) o RSA KAT (Signature Verification) o HMAC with SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 KAT o SP A Hash_DRBG DSA Pairwise Consistency Check Conditional Self-Tests Conditional self-tests are performed by the module whenever a new random number or a new asymmetric key pair is generated. If an error is encountered during an RSA or DSA pairwise consistency test, the module will return an error to the JRE and enter an error state. After entering the error state, all subsequent calls to the module requiring cryptographic operation or data output will be rejected. The JRE is responsible for resolving the error and returning the module to an operational state. This usually consists of unloading and reloading the module. No data will be returned by the module and the operation must be performed again. If the error persists, the module must be reinstalled. The VMware Horizon JCE Module performs the following conditional self-tests: SP A Hash_DRBG Continuous RNG Test RSA Pairwise Consistency Test for key pair generation DSA Pairwise Consistency Test for key pair generation VMware Horizon JCE (Java Cryptographic Extension) Module Page 15 of 21

17 2.8.3 Critical Functions Tests The SP A Hash_DRBG employed by the cryptographic module includes four critical functions. These critical functions include instantiation, generation, reseed, and uninstantiation. Each function is tested by the module during the module s -up self-tests. If any of these critical functions fail, the module will return an error to the JRE and will enter an error state. All subsequent calls to the module requiring cryptographic operation or data output will be rejected. The JRE will then proceed to unload and reload the module in order to reattempt these critical functions tests. If the error persists, the module must be reinstalled. The VMware Horizon JCE Module performs the following critical functions tests: DRBG Instantiate Critical Function Test DRBG Generate Critical Function Test DRBG Reseed Critical Function Test DRBG Uninstantiate Critical Function Test 2.9 Mitigation of Other Attacks This section is not applicable. The modules do not claim to mitigate any other attacks. 3 Secure Operation The VMware Horizon JCE Module meets Level 1 requirements for FIPS The sections below describe how to place and keep the module in a FIPS-Approved mode of operation. 3.1 Crypto Officer Guidance Installation and operation of the VMware Horizon JCE Module requires the proper installation of Horizon 6 servers and agents. The sections below provide a brief summary of the installation procedures for Horizon 6. For a more comprehensive instruction set, please refer to the Horizon 6 Installation Guide provided by VMware. The VMware Horizon JCE Module operates in the FIPS-Approved mode of operation after the instructions for Initial Setup (3.1.1) and Secure Installation (3.1.2) are followed. All guides mentioned within in these instructions are freely available for download at These instructions assume that the CO is familiar with VMware vsphere 6.0 and VMware Horizon 6 products Initial Setup Prior to the secure installation of Horizon 6, the CO shall prepare the virtual environment required to securely operate the Horizon 6 services. This includes installing the latest version of VMware vsphere 6.0 (see vsphere Installation and Setup). Included in this installation is the VMware vsphere Hypervisor (ESXi) 6.0, the vsphere 6.0 vsphere Client, and the vsphere 6.0 vcenter Server, all of which are prerequisites to installing Horizon 6. After installing the VMware vsphere 6.0 virtual environment, the CO shall log into the vcenter Server and create a Virtual Machine capable of running Windows 7 SP1 (32 bit) or Windows Server Once the VM has been provisioned the CO shall complete installation as described in section VMware Horizon JCE (Java Cryptographic Extension) Module Page 16 of 21

18 3.1.2 Secure Installation In order to install the VMware Horizon JCE Module, the CO shall follow the installation instructions provided in the Horizon 6.2 installation guide in order to securely install and configure the relevant Horizon 6 component (Connection Server, Security Server or Agent) which utilizes the VMware Horizon JCE Module. A brief summary of the installation steps is provided: Log into the Windows Operating System using an account with appropriate administrative rights Ensure the Windows Operating System has been configured to take advantage of FIPS based cryptography Run the relevant Horizon 6 installer (Connection Server and Security Server share the same install binary but the agent is separate package) When prompted select the option for FIPS based cryptography Complete the installation Successful completion of installing a Connection Server can be established by accessing the View Administrator UI. A Security Server is successfully installed when it can be used to connect from a client to a Connection Server. Successful agent installs can be verified by ensuring the desktop or RDSH server is shown as Available when added to a farm (for RDSH) or a pool (for desktops) VMware Horizon JCE Module Secure Operation Following the successful installation of the Horizon 6 components the CO shall ensure the relevant Horizon 6 services are running. After following the steps outlined in Sections and 3.1.2, the Horizon components will use the VMware Horizon JCE Module for operation in the FIPS-Approved mode. The CO shall follow the guidelines in the View Security Guide in order to securely configure and operate the VMware Horizon JCE Module. Additionally, the CO shall ensure the module is operated in accordance with the transition rules specified in SP A. Furthermore the transition tables available at the CMVP Web site ( can be referenced to inform users of the risks associated with using a particular algorithm and a given key length. 3.2 User Guidance The VMware Horizon JCE Module is designed for use by VMware Horizon. The user shall adhere to the guidelines of this Security Policy. The User does not have any ability to install or configure the module. Operators in the User role are able to use the services available to the User role listed in Table 4. The user is responsible for reporting to the CO if any irregular activity is noticed. VMware Horizon JCE (Java Cryptographic Extension) Module Page 17 of 21

19 4 Acronyms Table 8 describes the acronyms used in this Security Policy. Table 8 Acronyms Acronym AES API BIOS CBC CCM CFB CMAC CMVP CO CPU CSE CSP DES DRBG DSA DVD ECB ECIED EMC EMI FIPS GPC GUI HDD HMAC HTTPS IES ISO Definition Advanced Encryption Standard Application Programming Interface Basic Input/Output System Cipher Block Chaining Counter with CBC-MAC Cipher Feedback Cipher-based Message Authentication Code Cryptographic Module Validation Program Cryptographic Officer Central Processing Unit Communications Security Establishment Critical Security Parameter Data Encryption Standard Deterministic Random Bit Generator Digital Signature Algorithm Digital Video Disk Electronic Code Bank Elliptic Curve IES Electromagnetic Compatibility Electromagnetic Interference Federal Information Processing Standard General Purpose Computer Graphical User Interface Hard Disk Drive (keyed-) Hash Message Authentication Code Secure Hyper-Text Transfer Protocol Internet Key Exchange International Organization for Standards VMware Horizon JCE (Java Cryptographic Extension) Module Page 18 of 21

20 Acronym JCE JVM KAT KO LCD LED MD NIST OFB OS OVA OVF PCI PCI(e) PCT PKCS PSS RAM RC RSA SATA SCSI SHA SHS SP USB VPN Definition Java Crypto Extension Java Virtual Machine Known Answer Test Keying Option Liquid Crystal Display Light Emitting Diode Message Digest National Institute of Standards and Technology Output Feedback Operating System Open Virtual Appliance Open Virtualization Format Peripheral Component Interconnect Peripheral Component Interconnect (express) Pairwise Consistency Test Public Key Cryptography Standard Probabilistic Signature Scheme Random Access Memory Rivest Cipher Rivest Shamir Adleman Serial Advanced Technology Attachment Small Computer System Interface Secure Hash Algorithm Secure Hash Standard Security Policy Universal Serial Bus Virtual Private Network VMware Horizon JCE (Java Cryptographic Extension) Module Page 19 of 21

21 VMware, Inc Hillview Avenue Palo Alto CA USA Tel Fax Copyright All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.6 Prepared for: Prepared by: Symantec Corporation

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3

More information

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network

More information

IOS Common Cryptographic Module (IC2M)

IOS Common Cryptographic Module (IC2M) IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION

More information

Silent Circle Mobile Application Cryptographic Module

Silent Circle Mobile Application Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4. FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks Pulse Cryptographic Module FIPS 140-2 Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013 Juniper Networks, Inc. 1194 N. Mathilda Ave Sunnyvale, CA 94089 Copyright 2013 Juniper

More information

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Lexmark PrintCryption TM (Firmware Version 1.3.1) Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3

More information

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood

More information

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1. Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3

More information

Hydra PC FIPS Sector-based Encryption Module Security Policy

Hydra PC FIPS Sector-based Encryption Module Security Policy Hydra PC FIPS Sector-based Encryption Module Security Policy Revision Document No. 4 30 March 2010 SPYRUS, Inc. info@spyrus.com> SPYRUS Document No. 550-074001-04 Copyright 2009

More information

FIPS Level 1 Validation March 31, 2011 Version 1.12

FIPS Level 1 Validation March 31, 2011 Version 1.12 KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library Version 3.0 Security Policy FIPS 140-2 Level 1 Validation March 31, 2011 Version 1.12 Table of Contents 1 Introduction... 1 1.1 Acronyms and

More information

FireEye CM Series: CM-4400, CM-7400, CM-9400

FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye CM Series: CM-4400, CM-7400, CM-9400 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its

More information

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy

Samsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy Version 1.6 Last Update: 2014-02-11 Trademarks... 3 1. Introduction... 4 1.1. Purpose of the Security Policy... 4 1.2. Target Audience... 4 2. Cryptographic Module Specification... 5 2.1. Description of

More information

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy FEITIAN Technologies Company, LTD epass Token Hardware Version: 1.0.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 3 Document Version: 1.0 Prepared for: Prepared by: FEITIAN Technologies

More information

RSA BSAFE Crypto-C Micro Edition Security Policy

RSA BSAFE Crypto-C Micro Edition Security Policy Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_OSX_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple

More information

Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: ) FIPS Non-Proprietary Security Policy

Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: ) FIPS Non-Proprietary Security Policy Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: 8.5.0.2) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 1.0 Prepared for: Prepared by: Polycom, Inc. Corsec

More information

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,

More information

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy Hitachi Virtual Storage Platform (VSP) Encryption Board FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016 Copyright Hitachi, 2016 Version 4.0 Page 1 of 19

More information

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 1.3 June 25, 2015 1 Copyright Notice Copyright 2015 Dell Software,

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018 FIPS 140-2 Non-Proprietary Security Policy Acme Packet VME FIPS 140-2 Level 1 Validation Software Version: E-CZ 8.0.0 Date: July 20, 2018 Document Version 2.0 Oracle Communications This document may be

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

VMware OpenSSL FIPS Object Module

VMware OpenSSL FIPS Object Module VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304, USA Tel: 877-486-9273 Email: info@vmware.com http://www.vmware.com VMware OpenSSL FIPS Object Module Software Version: 2.0.9 FIPS 140-2 Non-Proprietary

More information

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4500 Document Version 2.5 December 5, 2014 Prepared For: Prepared By: Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 www.oracle.com

More information

FIPS Cryptographic Module Security Policy Entrust Authority Security Toolkit for the Java Platform

FIPS Cryptographic Module Security Policy Entrust Authority Security Toolkit for the Java Platform Title: Product: Date: Revision: FIPS 140-2 Cryptographic Module Security Policy ntrust Authority Security Toolkit for the Java Platform November 19, 2012 1.4 Copyright 2012 ntrust. All rights reserved.

More information

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9 Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple

More information

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FIPS 140-2 Security Policy v0.5 FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 1.0 Prepared By: Acumen Security 18504

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Acme Packet 3820 and Acme Packet 4500

Acme Packet 3820 and Acme Packet 4500 FIPS 140-2 Non-Proprietary Security Policy Acme Packet 3820 and Acme Packet 4500 FIPS 140-2 Level 2 Validation Firmware Version ECx 6.4.1 and ECx 6.4.1 M1 Hardware Version A1 August 28, 2015 Copyright

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication Security Policy 02.08.12 RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication This document is a non-proprietary security policy for RSA BSAFE Crypto-J

More information

Secure Cryptographic Module (SCM)

Secure Cryptographic Module (SCM) Page 1 of 11 FIPS 140 2 Cryptographic Module Security Policy Secure Cryptographic Module (SCM) Document Version 3.0.4 FIPS 140 2 Non Proprietary JVC KENWOOD Corporation Page 2 of 11 Revision History Date

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450 FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450 FireEye, Inc. FIPS 140-2 Non-Proprietary Security Policy Document Version: 0.4 Prepared

More information

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005 Security Builder R FIPS Java Module Version 2.0 FIPS 140-2 Non-Proprietary Security Policy Certicom Corp. September 27, 2005 c Copyright 2005 Certicom Corp. This document may be freely reproduced and distributed

More information

Security Policy. Jan 2012

Security Policy. Jan 2012 IBM Java JCE FIPS 140-2 Cryptographic Module Security Policy IBM JAVA JCE FIPS 140-2 Cryptographic Module Revision: 1.7 Jan 2012 Status: Final 1.7 Edition (February 2012) This edition applies to the 1.7

More information

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4 Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200

More information

Route1 FIPS Cryptographic Module

Route1 FIPS Cryptographic Module Route1 FIPS Cryptographic Module Security Policy Version 2.1.0.3 July 10, 2008 Strong encryption technology for software developers Contact Information Route1 Inc., 155 University Avenue, Suite 1920 Toronto,

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

FIPS Security Policy

FIPS Security Policy Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided

More information

Sony Security Module. Security Policy

Sony Security Module. Security Policy Sony Security Module Security Policy Document Version 1.0.0 Sony Corporation FIPS 140-2 Non-Proprietary Copyright 2010 Sony Corporation TABLE OF CONTENTS 1. MODULE OVERVIEW... 3 2. SECURITY LEVEL... 5

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy EgoSecure GmbH EgoSecure Full Disk Encryption (FDE) Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.5 06/12/2014 Copyright EgoSecure GmbH, 2014. May be reproduced only

More information

Barco ICMP FIPS Non-Proprietary Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy Barco FIPS 140-2 Non-Proprietary Security Policy 1 Page 1 of 26 Table of Content Table of Content... 2 1 Introduction... 3 1.1 Security Level... 3 1.2 Cryptographic Boundary... 4 1.3 FIPS 140-2 Approved

More information

Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: FIPS Non-Proprietary Security Policy

Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: FIPS Non-Proprietary Security Policy Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: 1.2.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 2 Document Version: 1.0 Prepared for:

More information

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY SafeNet LUNA EFT FIPS 140-2 LEVEL 3 SECURITY POLICY DOCUMENT NUMBER: CR-2786 AUTHOR(S): Brian Franklin / Terry Fletcher / Chris Brych DEPARTMENT: Engineering LOCATION OF ISSUE: Ottawa DATE ORIGINATED:

More information

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS 140-2 Non-Proprietary Security Policy, Version 1.7 Level 1 Validation October 2007 1. INTRODUCTION 3 2. PRODUCT, BOUNDARY,

More information

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0.

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0. FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4600 FIPS 140-2 Level 2 Validation Hardware Version: 4600 Firmware Version: E-CZ8.0.0 Date: July 20 th, 2018 Title: Acme Packet 4600 Security Policy

More information

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Cryptographic module used in Motorola Solutions Astro XTL5000, XTS5000, APX2000, SRX2200, APX4000, APX6000, APX6000XE, APX6500,

More information

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Security Level 2 Rev. 0.7 July 02, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 3 1.1

More information

FIPS Security Policy UGS Teamcenter Cryptographic Module

FIPS Security Policy UGS Teamcenter Cryptographic Module FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product

More information

FIPS Security Policy

FIPS Security Policy Version 1.8 Last Update: 09/4/2014 1 WideBand Corporation 401 West Grand Street, Gallatin, MO 64640, USA 1 The actual module is a single chip within the depicted package WideBand Corporation, 2014 and

More information

STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4

STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4 STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4 Inter-4 A Division of Sierra Nevada Corporation December 10, 2008 Copyright Sierra Nevada Corporation 2008. May be reproduced

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Pitney Bowes ibutton Postal Security Device (PSD) Hardware Version: MAXQ1959B-F50# Firmware Version: 9.01.00 Indicia Type: 0, 1, 2, 5, 7 and 8 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation

More information

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0. Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Security Level 2 Rev. 0.6 January 09, 2015 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 4

More information

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy FIPS 140-2 Level 2 Validation June 15, 2010 Version 1.4 2004, 2005, 2006, 2007, 2008, 2009, 2010 AirMagnet Inc. All rights reserved.

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

FIPS Non-Proprietary Security Policy. FIPS Security Level: 1 Document Version: 1.8

FIPS Non-Proprietary Security Policy. FIPS Security Level: 1 Document Version: 1.8 Hewlett-Packard Development Company, L.P. ilo 3 Cryptographic Module Firmware Version: 1.50 Hardware Version: ASIC (GLP: 531510-003) with Flash Memory (41050DL00-233-G), NVRAM (420102C00-244-G), and DDR3

More information

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy

More information

Oracle Linux 7 OpenSSH Server Cryptographic Module

Oracle Linux 7 OpenSSH Server Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-2.0.0 Date: September 25, 2017 Document Version 1.2 Oracle

More information

Cisco Systems 5760 Wireless LAN Controller

Cisco Systems 5760 Wireless LAN Controller Cisco Systems 5760 Wireless LAN Controller FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 1.2 April 10, 2015 1 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODEL...

More information

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE INFORMATION TECHNOLOGY SECURITY GUIDANCE CRYPTOGRAPHIC ALGORITHMS FOR UNCLASSIFIED, PROTECTED A, AND PROTECTED B INFORMATION ITSP.40.111 August 2016 FOREWORD The Cryptographic Algorithms for UNCLASSIFIED,

More information

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy i IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07 Security Policy Document ii Table of Contents 1 Document History... 1 2 Introduction... 2 2.1 References... 4 2.2 Document Organization...

More information

Oracle Linux 6 OpenSSH Server Cryptographic Module

Oracle Linux 6 OpenSSH Server Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 6 OpenSSH Server Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R6-1.0.0 Date: September 28, 2017 Document Version 1.3 Oracle

More information

Non-Proprietary Security Policy Version 1.1

Non-Proprietary Security Policy Version 1.1 McAfee, Inc. Network Security Platform Sensor NS-9100 and NS-9200 Non-Proprietary Security Policy Version 1.1 March 16, 2016 Copyright McAfee, Inc. 2016. May be reproduced only in its original entirety

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R) Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy

More information

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version: Watchdata Technologies Pte Ltd. 7F Qiming International Mansion, No.101, Wangjing Lize Middle Park, Chaoyang District, Beijing, P.R.China, 100102 Phone : (8610)6472 2288 (8610)8047 8166 Email : marketing@watchdata.com

More information

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski About CygnaCom FIPS and Common Criteria Services Accredited testing laboratories NIAP, NIST, CSEC Professional Services PKI infrastructure

More information

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced

More information

Forcepoint LLC. Forcepoint Sidewinder Module version: 8.3.2, firmware version: 8.3.2P07 with patch 8.3.2E106

Forcepoint LLC. Forcepoint Sidewinder Module version: 8.3.2, firmware version: 8.3.2P07 with patch 8.3.2E106 Forcepoint LLC Forcepoint Sidewinder Module version: 8.3.2, firmware version: 8.3.2P07 with patch 8.3.2E106 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document revision 014, July 2016

More information

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: Winterson Road Linthicum, MD 21090

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: Winterson Road Linthicum, MD 21090 Ciena Corporation 565/5100/5200 Advanced Services Platform FW Version: 11.2 HW Versions: 565 Chassis (NT0H50DAE5 REV 004), Backplane SP Card (NT0H5066E5 Rev 04), QOTR/E Card (NT0H25BAE5 Rev 2), Filler

More information

RFS7000 SERIES Wireless Controller. FIPS Cryptographic Module Security Policy

RFS7000 SERIES Wireless Controller. FIPS Cryptographic Module Security Policy RFS7000 SERIES Wireless Controller FIPS 140 2 Cryptographic Module Security Policy Version: 17 Date: April 3, 2014 Copyright 2014 Version 17 Page 1 of 20 CHANGE RECORD Revision Date Author Description

More information

Motorola PTP 800 Series CMU Cryptographic Module Security Policy

Motorola PTP 800 Series CMU Cryptographic Module Security Policy POINT TO POINT WIRELESS SOLUTIONS GROUP Motorola PTP 800 Series CMU Cryptographic Module Security Policy R. A. Carter Reference: Wednesday 21 March 2012 This document describes the PTP 800 Series FIPS

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010 CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy Version 3 June 30, 2010 Dolby Laboratories Licensing Corporation Corporate Headquarters Dolby Laboratories, Inc. Dolby Laboratories Licensing

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677 Non-Proprietary Security Policy for the FIPS 140-2 Level 2 Validated AirFortress Wireless Security Gateway Hardware Model AF7500 (Document Version 2.3) March 2007 Prepared by the Fortress Technologies,

More information

SUSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0. FIPS Non-Proprietary Security Policy

SUSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0. FIPS Non-Proprietary Security Policy SSE Linux Enterprise Server 12 libgcrypt Cryptographic Module version 1.0 Version 1.3 Last update: 2015-10-23 Prepared by: atsec information security corporation 9130 Jollyville Road, Suite 260 Austin,

More information

Avaya, Inc. Secure Router 2330 Hardware Version: SR2330; Firmware Version: FIPS Non-Proprietary Security Policy

Avaya, Inc. Secure Router 2330 Hardware Version: SR2330; Firmware Version: FIPS Non-Proprietary Security Policy Avaya, Inc. Secure Router 2330 Hardware Version: SR2330; Firmware Version: 10.3.0.100 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 2 Document Version: 1.6 Prepared for: Prepared by:

More information

Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy

Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS 140-2 Security Policy System Release 800-04-12-FIPS CONTENTS 1 Introduction... 5 1.1 Purpose... 5 1.2 Port

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Security Policy Document Version 3.3. Tropos Networks

Security Policy Document Version 3.3. Tropos Networks Tropos Control Element Management System Security Policy Document Version 3.3 Tropos Networks October 1 st, 2009 Copyright 2009 Tropos Networks. This document may be freely reproduced whole and intact

More information